
Trusted Computing Platforms: Tcpa Technology in Context
Siani Pearson, Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler
Résumé
TCPA: Building computing platforms upon a solid foundation of trust.
As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future.
* What trusted computing platforms are, how they work, and
what problems they will solve
* Transforming standard platforms into trusted platforms
cost-effectively
* Scenarios for managers: TCPA applications in the
security-focused business
* Protected storage: how TCPA can ensure the
confidentiality of stored data
* Software integrity: ensuring that a system's software
environment hasn't been tampered with
* Trust mechanisms in a trusted platform: functional
descriptions, advantages, and overhead
* Trusted platforms in practice: TCPA for developers and
technical professionals
* How trusted platforms can be used to protect user
privacy
* The TCPA initiative: its history, status, and next steps
forward
Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology—and with this book, you will.
ContentsI. INTRODUCING TRUSTED PLATFORM TECHNOLOGY.
1. Trusted (Computing) Platforms: An Overview.
Summary of Trusted Platform Concepts. Why Are Trusted
Platforms 'Trusted'? The Value of Trusted Platforms. The
Main Features of Trusted Platforms. When All Platforms Are
Trusted Platforms.
2. Usage Scenarios.
Straightforward Application of TCPA Trusted Platforms.
Speculative Use of Trusted Platforms.
3. Key Components of Trusted Platform Technology.
Special Properties of Trusted Platforms. Roots of Trust.
Trusted Platform Architectural Adaptations. Integrity.
Identity. Protected Storage. Secure Boot and Authenticated
Boot Processes.
II. TRUST MECHANISMS IN A TRUSTED PLATFORM.
4. Access Control-Ownership, Enabling, and
Authorization.
Enabling, Activating, and Owning a TPM. Cryptographic
Authorization. Descriptions of TPM Capabilities.
5. Platform Identification and Certification.
Platform Endorsement. Attestation for Platform Identity
Mechanisms. Generating a Trusted Platform Module Identity.
Signing with TPM Identities. TPM Capabilities.
6. Integrity Recording, Reporting, and Secure Boot.
PlatformConfiguration Register (PCR). Data Integrity
Registers. TPM Capabilities.
7. Protected Storage.
Concept of Protected Storage. Functions of Protected
Storage.
8. Migration and Maintenance Mechanisms.
The Concepts of Migration and Maintenance. Migration.
Maintenance. TPM Capabilities.
9. Conventional Security Functions and Assorted Host
Functions.
Conventional Security Services. Capabilities. Auditing the
TPM.
III. TRUSTED PLATFORMS IN PRACTICE.
10. Bringing a Trusted Platform to Life.
Building the Bases. Setting Up the Platform. Managing
Authorization in the Key Hierarchy. On-Going Platform
Support.
11. Building Trust.
In TCPA We Trust. Trusting the Roots. Trusting the
Platform.
12. Challenging a Trusted Platform.
Communication with a Trusted Platform. Example.
IV. TRUSTED PLATFORMS FOR ORGANIZATIONS AND INDIVIDUALS.
13. Corporate Deployment of Trusted Platforms.
Overall Architecture. Deployment.
14. The Trusted Platform in Front of You.
Establishing Users' Trust in Their TPs. Trusted Signing.
Multiple Smart Cards. Dedicated Trusted States.
Appendix A: Brief History of TCPA.
Evolution of TCPA. About TCPA. Choice of Platform. Further
Information.
Appendix B: Trust Models and the E-Commerce Domain.
Social Models of Trust. Trust in E-Commerce. Benefits for
a Company in Being Associated with Trust.
Conclusions.
Appendix C: Basic Cryptographic Primitives Used in the
TCPA Specification.
Basic Security Services. Basic Cryptographic
Primitives.
Glossary.
References.
Index.
L'auteur - Siani Pearson
DR. SIANI PEARSON is a Research Scientist at Hewlett Packard's Trusted e-Services Lab and has been a key member of the HP Labs team involved in founding and developing the Trusted Computer Platform Alliance (TCPA). She holds a Ph.D. in automated theorem proving at Edinburgh University and earned a fellowship at Cambridge University working in the same field. For the past four years, her research has focused on computer security, trust, and privacy.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Siani Pearson, Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler |
Parution | 20/08/2002 |
Nb. de pages | 322 |
Format | 18 x 24 |
Couverture | Relié |
Poids | 865g |
Intérieur | Noir et Blanc |
EAN13 | 9780130092205 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet